نتایج جستجو برای: heist

تعداد نتایج: 52  

Journal: :E3S web of conferences 2023

In recent years, ransomware attacks have become a more significant source of computer penetration. Only general-purpose computing systems with sufficient resources been harmed by so far. Numerous prediction strategies published, but practical machine learning techniques still need to be developed. order anticipate assaults, this study provides method for obtaining data from artificial intellige...

Journal: :jundishapur journal of health sciences 0
zeynab sadat nezamodini department of occupational health, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran; department of occupational health, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran. tel: +98-9125441692 fatemeh khodamoradi department of occupational health, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran maryam malekzadeh department of occupational health, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran hossein vaziri department of occupational health, school of health, ahvaz jundishapur university of medical sciences, ahvaz, ir iran

conclusions finally, in order to prevent the occurrence and reduce the consequences of identified errors the following suggestions were proposed : appropriate training courses, applying work guidelines and monitoring their implementation, increasing the number of work shifts, hiring professional workforce, equipping work space with appropriate facilities and equipment. background although healt...

Journal: :Monthly Notices of the Royal Astronomical Society 2022

ABSTRACT Gravitational interactions in star-forming regions are capable of disrupting and destroying planetary systems, as well creating new ones. In particular, a planet can be stolen, where it is directly exchanged between passing stars during an interaction; or captured, first ejected from its birth system free-floating for period time, before being captured by star. We perform sets direct N...

Journal: :Circulation 2010
Quynh A Truong Kibar Yared Pál Maurovich-Horvat Emily Siegel Roberto J Cubeddu Mary Etta King E Kevin Heist Moussa Mansour Godtfred Holmvang

Copyright © 2010 American Heart Association. All rights reserved. Print ISSN: 0009-7322. Online 72514 Circulation is published by the American Heart Association. 7272 Greenville Avenue, Dallas, TX DOI: 10.1161/CIR.0b013e3181d56ebd 2010;121;e229-e232 Circulation Cubeddu, Mary Etta King, E. Kevin Heist, Moussa Mansour and Godtfred Holmvang Quynh A. Truong, Kibar Yared, Pál Maurovich-Horvat, Emily...

2017

Viruses travel light. Most carry just their genetic material and a few tools to break into the cells of their hosts — after that, they hijack the host’s own machinery to manufacture thousands of copies of themselves. In recent decades, biologists have gained a clearer picture of just how this heist is pulled off. Many viruses, it turns out, suppress the messages that cells send to control their...

Journal: :Journal of bacteriology 1961
C V REICH C E HEIST H W DUNNE

Reich, C. V. (Pennsylvania State University, University Park), C. E. Heist, and H. W. Dunne. Agglutinin-adsorption analysis of Vibrio fetus. J. Bacteriol. 82:210-214. 1961.-All pathogenic strains of Vibrio fetus are apparently members of a single serotype. Within this broad grouping, it was possible to define the relationship of certain selected strains by a system of complete reciprocal adsorp...

ژورنال: سلامت کار ایران 2013
جباری, موسی, زراءنژاد, عباس, کشاورزی, مهرزاد,

  Background and aims: Considering the role of human errors in the incidence of catastrophic events in control rooms and also Lack of effectiveness of classical techniques to identify the human errors, special techniques are required for identification of human errors. Therefore, this study aimed to identify human errors in the control room in an oil company Using HEIST Technique.   Methods: Th...

Journal: :Scandinavian journal of clinical and laboratory investigation 1962
O S ANDERSEN

Ever since Henderson in 1908 introduced Guldberg & Waage’s Law of Chemical Equilibrium (1867) in biology applied to the dissociation of carbonic acid, new studies on the first dissociation exponent of carbonic acid in plasma have appeared in the literature. (Hasselbalch 1916, Warburg 1922, Hastings, Sendroy & Van Slyke 1928 and Severinghaus, Stupfel & Bradley 1956). There is, however, still dis...

2012
Rozhan M. Idrus

This paper reports the findings of a research conducted to evaluate the ownership and usage of technology devices within Distance Education students’ according to their age. This research involved 45 Distance Education students from USM Universiti Sains Malaysia (DEUSM) as its respondents. Data was collected through questionnaire that had been developed by the researchers based on some literatu...

Journal: :East European Politics 2022

Is Covid-19 undermining European democracies? Recent scholarship overlooks the fact that most pandemic-related erosions of democracy can be attributed to illiberal inertia long in place before 2019. Did democratic decay occur during pandemic or due pandemic? We analyse extent which power grabs succeeded and failed Europe with special attention Czech Republic, Hungary, Poland, Slovakia. The exec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید